2009
DOI: 10.1007/978-3-642-04444-1_42
|View full text |Cite
|
Sign up to set email alerts
|

Set Covering Problems in Role-Based Access Control

Abstract: Abstract. Interest in role-based access control has generated considerable research activity in recent years. A number of interesting problems related to the well known set cover problem have come to light as a result of this activity. However, the computational complexity of some of these problems is still not known. In this paper, we explore some variations on the set cover problem and use these variations to establish the computational complexity of these problems. Most significantly, we introduce the minim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
24
0
1

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 11 publications
1
24
0
1
Order By: Relevance
“…El SCP fue incluido en la lista de 21 problemas NP-completos de Karp (Karp, 2010). Existen muchos usos prácticos para este problema como son: Localización de unidades de conexión en redes vehiculares (Sarubbi et al, 2017), ubicación de instalaciones (Crawford et al, 2017), ruteo de vehículos (Cacchiani, Hemmelmayr, & Tricoire, 2014;Prata, 2016;Yakici, 2017), asignación de tráfico en sistemas de comunicación satelitales (Ribeiro, Minoux, & Penna, 1989;Ceria, Nobili, & Sassano, 1998), asignación de tripulantes en líneas aéreas (Housos & Elmroth, 1997), asignación y ruteo de trenes (Samà et al, 2015), control de acceso basado en roles (Chen & Crampton, 2009) entre otros.…”
Section: Materiales Y Métodosunclassified
“…El SCP fue incluido en la lista de 21 problemas NP-completos de Karp (Karp, 2010). Existen muchos usos prácticos para este problema como son: Localización de unidades de conexión en redes vehiculares (Sarubbi et al, 2017), ubicación de instalaciones (Crawford et al, 2017), ruteo de vehículos (Cacchiani, Hemmelmayr, & Tricoire, 2014;Prata, 2016;Yakici, 2017), asignación de tráfico en sistemas de comunicación satelitales (Ribeiro, Minoux, & Penna, 1989;Ceria, Nobili, & Sassano, 1998), asignación de tripulantes en líneas aéreas (Housos & Elmroth, 1997), asignación y ruteo de trenes (Samà et al, 2015), control de acceso basado en roles (Chen & Crampton, 2009) entre otros.…”
Section: Materiales Y Métodosunclassified
“…In order to show the safe cover of GUAQ problem is NPhard, we reduce a special case of it to the NP-hard container optimization problem [12] to the special case. In the container optimization problem, the inputs are a finite set X, a family !…”
Section: Definition 2 (The Safe Cover Of Guaq Problem)mentioning
confidence: 99%
“…Another similar problem is proposed by Du et al with the name of inter-domain role mapping (IDRM) problem [10], which relates to determining whether a user's request for activating a set of roles can be granted or not. Chen [12] constructed a series of role-based models and used these models to investigate least privilege and the IDRM problem in the presence of multiple role hierarchies and temporal constraints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Role mining algorithms have been presented based on set covering [3], graph theory [6,26], subset enumeration [25], database tiling [23]. The theoretical aspects of the RMP have been considered in [24,23,3], where the complexity of the problem has been analyzed and its equivalence to other known optimization problem showed. Another interrelated problem, i.e.…”
Section: Related Workmentioning
confidence: 99%